DEV Community


Discussion on: Cryptography for programmers 3: Hashes, MACs & JWT

anduser96 profile image
Andrei Gatej

Thanks for such an informative answer!

Maybe the public and private keys approach would be useful when adopting a Microservices architecture, where each service would hold the public key.

Looking forward to your next article!